CVE-2026-25475: OpenClaw Vulnerable to Local File Inclusion via MEDIA: Path Extraction
The isValidMedia() function in src/media/parse.ts allows arbitrary file paths including absolute paths, home directory paths, and directory traversal sequences. An agent can read any file on the system by outputting MEDIA:/path/to/file, exfiltrating sensitive data to the user/channel.
References
Code Behaviors & Features
Detect and mitigate CVE-2026-25475 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →